000 | 03275nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-319-95729-6 | ||
003 | DE-He213 | ||
005 | 20240423125703.0 | ||
007 | cr nn 008mamaa | ||
008 | 180709s2018 sz | s |||| 0|eng d | ||
020 |
_a9783319957296 _9978-3-319-95729-6 |
||
024 | 7 |
_a10.1007/978-3-319-95729-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aData and Applications Security and Privacy XXXII _h[electronic resource] : _b32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedings / _cedited by Florian Kerschbaum, Stefano Paraboschi. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXI, 350 p. 105 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v10980 |
|
520 | _aThis book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on administration, access control policies, privacy-preserving access and computation, integrity and user interaction, security analysis and private evaluation, fixing vulnerabilities, and networked systems. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 0 |
_aInformation technology _xLaw and legislation. |
|
650 | 0 | _aApplication software. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aArtificial intelligence. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aArtificial Intelligence. |
700 | 1 |
_aKerschbaum, Florian. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aParaboschi, Stefano. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319957289 |
776 | 0 | 8 |
_iPrinted edition: _z9783319957302 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v10980 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-95729-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c180641 _d180641 |